摘要:
A concept for providing a process and apparatus for allocating a gamut of assets/resources across a spectrum of consumers is described. The concept includes an apparatus for allocating resources across a spectrum of users. The apparatus includes one or more processors and a memory coupled to the one or more processors. The memory is configured to store data representative of characteristics and capabilities of the resources and describing needs of the spectrum. The memory further includes computer readable code configured to cause the one or more processors to perform acts of: estimating current requests from the spectrum for the resources; comparing the current requests to the capabilities and characteristics; and allocating the resources with respect to the requests in conformance with a convex program implementation of Arrow-Debrue theory.
摘要:
A system that facilitates efficient code construction comprises a component that receives a first code and a transformation component that transforms the first code to a new code. The new code has essentially same length parameters as the first code but is hidden to a computationally bounded adversary. The first code can be designed in the noise model and appear random to a computationally bounded adversary upon transformation.
摘要:
The claimed subject matter relates to an architecture or extension to an operating system (or component thereof) that can facilitate extensible themes for or advertising integration with a desktop that is managed by the operating system. In particular, the architecture can acquire advertisement content such as ads or advertiser skins, select suitable content for display, and configure the operating system to display the selected content. The architecture also provides mechanisms for identifying suitable locations as well as appropriate time for displaying the content.
摘要:
A system, method, and computer readable medium is provided to track consumer engagement with a product promotion. To begin, the method may receive an engagement notification from a consumer device. The engagement notification may have data representing an engagement code. Further, the engagement code may be associated with a merchant. The method may then update the engagement data associated with the engagement code. The engagement data may have data that tracks a number of times the engagement code has been scanned by consumer devices. The method may then provide, to the consumer device, product data associated with a product code based on the engagement code being associated with the product code. The product code may have been previously assigned to a manufacturer.
摘要:
Various embodiments provide offline algorithms for resource allocation. A known set of “offline” requests may be matched to available resources using an online resource allocation algorithm that models the offline resource allocation problem as though the requests were received stochastically. Requests may be scaled and then sampled to provide random, stochastic input for the online resource allocation algorithm. For each request, resources are allocated to the request by evaluating multiple options based upon shadow costs assigned to resources associated with the different options. After each request is processed, an adjustment is made to the shadow costs for remaining resources to reflect differences in rates for allocation and/or consumption of the resources and the updated shadow costs are used for a subsequent request. A scaled resource allocation determined using sampled requests in this manner may be scaled back up to obtain a solution for the offline resource allocation problem.
摘要:
Disclosed is a method for determining the placement of ITAPs in wireless neighborhood networks. The method disclosed provides for efficient integration of multi-hop wireless networks with the Internet by placing ITAPs at strategic locations. Initially the method provides for the formulation of the ITAP placement problem under three wireless models. For each model, methods are developed to efficiently place ITAPs in the networks. The methods aim to minimize the number of required ITAPs while guaranteeing users' bandwidth requirements. Next, a fault tolerance version of the placement method is presented that provides bandwidth guarantees in the presence of failures. Finally the methods are extended to take into account variable traffic demands by developing an approximation algorithm to simultaneously optimize ITAP placement based on demands over multiple periods.
摘要:
A user may submit to a set of users a query relating to a commercial transaction, and may evaluate the responses provided therefrom. However, the set of users may include vendors or their representatives who might present inaccurate or misleading information in order to persuade the user to purchase the product, or may provide low-quality and impersonal advertisements for a product that do not particularly relate to the query or the user. Instead, the query may be offered to agents who can provide relevant responses, and a response from an agent may be provided to the user in exchange for a response fee charged to the agent. This cost model may promote selectivity and high relevance to the query in the submission of responses from knowledgeable responders, thereby eliciting higher-value responses to the query for the user and financial sponsorship to cover the operating costs of the agent network.
摘要:
Providing for scheduling tasks in a distributed system based on an inefficiency of each task on a particular machine as compared with available networked machines is described herein. By way of example, a distribution component can receive a plurality of tasks at a machine assigned by at least one independent agent. In addition, an ordering component can schedule each task on a machine as a function of non-decreasing inefficiency. Such a policy can be implemented locally at the machine, minimizing inter-device communication, while only marginally increasing completion time for the set of tasks. In such a manner, the subject disclosure provides for load balancing of distributed systems in a manner that utilizes fewer resources than conventional approaches.
摘要:
Disclosed is a general model and method for computing performance bounds in multi-hop wireless networks. Rather than focusing on computing asymptotic performance bounds under assumptions of homogeneity or randomness in the network topology and/or workload, the present invention accommodates any given network, technology, interference model, routing paradigm, and workload. Using a conflict graph to formally characterize the impact of wireless interference on the performance of multi-hop wireless networks, methods for computing upper and lower bounds on the capacity of a given wireless network are detailed. Besides computing network capacity, the model and method disclosed can also enable or benefit other applications including maximizing fairness and minimizing maximum link utilization.
摘要:
An archive of items, which are computing data accessed by a user, is created at a semantic object level. The object archiving may group seemingly disparate items as a composite object, which may then be stored to enable retrieval by the user at a later point in time. The composite object may include metadata from the various items to enable identifying the composite object, providing retrieval capabilities (e.g., search, etc.), and so forth. In some aspects, an archiving process may extract item data from an item that is accessed by a computing device. Next, the item may be selected by a schema for inclusion in a composite object when the item data meets criteria specified in the schema. The composite object(s) may then be stored in an object store as an archive (backup).